 |
|
|
 Agent-based Ubiquitous Computing (Atlantis Ambient and Pervasive Intelligence)
Ubiquitous computing names the third wave in computing, where the personal computing
era appears when technology recedes into the background of our lives. The widespread use
of new mobile technology implementing wireless communications such as personal digital
assistants (PDAs) and smart phones enables a new type of advanced... |  |  Real-Time Embedded Systems: Optimization, Synthesis, and Networking
Embedded systems are electronic systems that include a microprocessor to
perform certain specific tasks. The microprocessor is embedded or hidden inside
these products. Embedded systems are ubiquitous. Every week millions
of tiny chips come out of factories like Freescale, Microchip, Philips, Texas
Instruments, and Mitsubishi,... |  |  Engineering Analysis of Smart Material Systems
The field of smart materials has grown considerably in the past ten to fifteen years
as topics have transitioned from basic research to commercial applications. In the
beginning stages of my career it was still rather exotic for a device or structure to
be called “smart.” It was the early 1990s, and while the... |
|
 Windows 7 Made Simple (Made Simple Apress)
On your computer screen is the most exciting new release of Windows in the last 10
years: Windows 7. This Quick Start Guide will get you up and running with Windows in
no time. You’ll learn what’s new in Windows 7, how to find your way around the
Windows 7 desktop, where to find your programs and documents, and several... |  |  |  |  |
|
 Taking Your Android Tablets to the Max
Silently, and without warning, the Android operating system has quickly dominated the mobile
ecosystem. This operating system exists in many forms, across many devices, and offers a rich
selection of powerful features that could completely change how you accomplish tasks
throughout your day. If you’re looking for a tablet or... |  |  Taking Your Kindle Fire to the Max
With the advent of the internet , the proliferation of mobile phones, and the rapid development
of wireless technologies, we are truly living in a digital age.
It seems like only yesterday that we were using dial-up, and that awful scream from the
modem meant that we were online at data speeds that would seem like a... |  |  Penetration Testing: A Hands-On Introduction to Hacking
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman... |
|
| Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 |